EHE Module 01: Information Security Fundamentals

EHE Module 01: Information Security Fundamentals

12th Grade

55 Qs

quiz-placeholder

Similar activities

2021 SAMPLE PAPER 3 (TERM 1)

2021 SAMPLE PAPER 3 (TERM 1)

11th - 12th Grade

55 Qs

Topic 3.1 Areas of Computer Ethics

Topic 3.1 Areas of Computer Ethics

12th Grade

53 Qs

Safety and Security - Easy

Safety and Security - Easy

7th Grade - University

57 Qs

Cyber security revision for Jan 25 exam

Cyber security revision for Jan 25 exam

11th Grade - University

60 Qs

BTEC DIT COMPONENT 3 - PRACTICE

BTEC DIT COMPONENT 3 - PRACTICE

12th Grade

60 Qs

Legal Issues that Affect Media

Legal Issues that Affect Media

9th - 12th Grade

55 Qs

The Internet - AP CSP Unit 4

The Internet - AP CSP Unit 4

9th - 12th Grade

53 Qs

MIL long quiz

MIL long quiz

12th Grade - University

50 Qs

EHE Module 01: Information Security Fundamentals

EHE Module 01: Information Security Fundamentals

Assessment

Quiz

Computers

12th Grade

Medium

Used 5+ times

FREE Resource

55 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary focus of information security?

Ease of use

Well-being of information and infrastructure

Increasing network speed

Reducing software costs

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT an element of information security?

Confidentiality

Integrity

Usability

Non-repudiation

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a challenge in information security?

Abundance of cybersecurity professionals

Simple privacy regulations

Compliance with government laws and regulations

Easy centralization of security

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a motive behind information security attacks?

Enhancing user experience

Disrupting business continuity

Improving software functionality

Increasing network bandwidth

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a characteristic of passive attacks?

Tampering with data in transit

Intercepting and monitoring network traffic

Using privileged access to violate rules

Tampering with hardware or software

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of an active attack?

Sniffing and eavesdropping

Footprinting

Man-in-the-Middle

Network traffic analysis

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of attack involves using privileged access to violate rules?

Passive Attack

Insider Attack

Distribution Attack

Close-in Attack

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?